Search This Blog

Wednesday, August 19, 2009

The 10 Stupidest Tech Company Blunders; FTC's electronic health record breach rule sparks debate

FTC's electronic health record breach rule sparks debate; DNS 'blacklist' unveiled
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Symantec
rule

Try Now. Symantec Protection Suite.
Easy to deploy comprehensive protection suite. Secure and manage your IT risk.

Learn more now.

rule

Spotlight Story
The 10 Stupidest Tech Company Blunders

Some of the biggest high-tech deals never happened. Some of the most promising products and services never came to be. Why? Because the people and companies involved didn't realize what they were letting slip through their fingers, or they simply couldn't foresee what would happen afterward. Read full story

Related News:

FTC's electronic health record breach rule sparks debate
Trying to get a handle on what most certainly will be an explosion of digitization of medical records the Federal Trade Commission today issued the final rules requiring "certain Web-based businesses to notify consumers" when the security of their electronic health information is breached.

DNS 'blacklist' unveiled
Nominum plans to announce on Tuesday a novel DNS security capability that functions like a spam blacklist, providing automated, real-time checking of DNS queries against a list of Web sites that are known to be malicious.

Hacker stole 130 million credit card details
A US hacker who conspired with two Russian cyber criminals in a bid to steal 130 million credit card details could face up to 25 years in prison.

8 Dirty Secrets of the IT Security Industry
Joshua Corman would seem an unlikely critic of IT security vendors. After all, he works for one. Yet Corman, principal security strategist for IBM's Internet Security Systems division, is speaking out about what he sees as eight trends undermining the ability of IT security practitioners to mount an effective defense against online outlaws.

Motorola boosts wireless network security
Motorola Tuesday said it is adding vulnerability assessment to its wireless intrusion-prevention system (IPS) device so that organizations can scan for security holes in Wi-Fi and wireline networks.

Start-up DroidSecurity tackles Google Android security
Start-up DroidSecurity is developing consumer and enterprise security software for the Google Android operating system, with its first offering a consumer-oriented antivirus and phone-tracking suite for Android smartphones.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Optimizing IT Budgets In tight Economic Times
Download this whitepaper and learn how one $5,000-10,000 server can manage 250,000 endpoints reducing the number of consoles and Full-Time Employees (FTEs) to manage them.
Learn More


Dynamic Security in the Virtualized Data Center Network
New application designs and new infrastructures based on virtual resources are generating new communication patterns in data center networks that can't be secured by conventional, perimeter-oriented designs. Join us for this live webcast September 17, 2009 to discover a dynamic, scalable architecture for securing virtual services in new data center networks and how to extend protection across the new traffic flows and much more.
Register today.

 

August 19, 2009

TOP STORIES | MOST DUGG STORIES

  1. Apple disasters
  2. Account password reset procedures a joke
  3. FAQ: How to get Windows 7 on the cheap
  4. When Apple flops: The worst products of all time
  5. Port 666
  6. Buy Guitar Hero 5, get GH Van Halen early
  7. Microsoft planned to bury XML developer, says federal judge
  8. How to build a 100,000-port Ethernet switch
  9. The greatest open source software of all time
  10. The 10 most idiotic iPhone apps

CCM for IT Compliance and Risk Management
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: